Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-24045 : What You Need to Know

Learn about CVE-2022-24045, a vulnerability impacting Siemens' Desigo products allowing session cookies exposure over unencrypted networks, enabling attackers to capture sensitive information.

A vulnerability has been identified in Siemens' products including Desigo DXR2, Desigo PXC3, Desigo PXC4, and Desigo PXC5. The vulnerability allows for the exposure of session cookies over an unencrypted network, potentially leading to the capture of sensitive information by an attacker.

Understanding CVE-2022-24045

This CVE details a security issue in Siemens' products that could result in the interception of sensitive information.

What is CVE-2022-24045?

The vulnerability in Desigo products allows session cookies to be transmitted over unencrypted HTTP, making them accessible to attackers sniffing the network.

The Impact of CVE-2022-24045

The risk of exposing sensitive information is significant, particularly if the affected products are accessed via unsecured networks.

Technical Details of CVE-2022-24045

The vulnerability arises from the session cookie being set without necessary security attributes post successful login. Attackers could exploit this to intercept sensitive information.

Vulnerability Description

The issue occurs due to the lack of security attributes on session cookies, allowing unauthorized access to sensitive data.

Affected Systems and Versions

        Desigo DXR2: All versions < V01.21.142.5-22
        Desigo PXC3: All versions < V01.21.142.4-18
        Desigo PXC4: All versions < V02.20.142.10-10884
        Desigo PXC5: All versions < V02.20.142.10-10884

Exploitation Mechanism

Upon successful login, session cookies are set without necessary security attributes, making them vulnerable to interception over unencrypted networks.

Mitigation and Prevention

It is crucial to take immediate steps for mitigation and establish long-term security practices for enhanced protection.

Immediate Steps to Take

Users should avoid accessing the affected applications over unencrypted networks and enabling necessary security measures.

Long-Term Security Practices

Implement HTTPS protocols, set Secure, HttpOnly, and SameSite attributes for session cookies, and monitor network traffic for any unauthorized access.

Patching and Updates

Regularly update the affected products to the latest secure versions and follow Siemens' recommendations for security best practices.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now